Skip to content

Web shell via File upload functionality in Home owners collection management system

Notifications You must be signed in to change notification settings

lohyt/web-shell-via-file-upload-in-hocms

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 

Repository files navigation

CVE-2022-25016

Web-shell-via-file-upload-in-hocms

Web shell via File upload functionality in Home owners collection management system

Description: Web shell via file upload functionality in Home Owners Collection Management System from Sourcecodester website.

[Vulnerability Type] Web shell via file upload functionality.

[Vendor of Product] https://www.sourcecodester.com/

[Affected Product Code Base] Student Attendance Management System

[Affected Component] http://localhost/student_attendance/index.php?page=site_settings

[Attack Type] Remote

[Impact Information Disclosure] true

[Attack Vectors] Steps to reproduce: Navigate to the url http://localhost/hocms/admin/?page=system_info Download the webshell from https://raw.githubusercontent.com/artyuum/Simple-PHP-Web-Shell/master/index.php and save it with php extension. Upload the php file that has been saved in the above step and click on update. Right click on the broken image and click on "Open link in new tab" The web shell gets executed and attacker can run arbitrary os commands on the server.

[Discoverer] M Lohith

About

Web shell via File upload functionality in Home owners collection management system

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published